[ZDNet] Online safety and end-to-end encryption can co-exist, says data protection watchdog. But how?

End-to-end encryption has stirred debates over the past few years. Now the UK’s data protection watchdog has determined that it is still a crucial technology for protecting user privacy.

Source: Read More (Latest topics for ZDNet in Security)

You might be interested in …

[HackerNews] VMware Issues Patches to Fix New Flaws Affecting Multiple Products

All posts, HackerNews

VMware on Wednesday shipped¬†security updates¬†to address vulnerabilities in multiple products that could be potentially exploited by an attacker to take control of an affected system. The six security weaknesses (from CVE-2021-22022 through CVE-2021-22027, CVSS scores: 4.4 – 8.6) affect VMware vRealize Operations (prior to version 8.5.0), VMware Cloud Foundation (versions 3.x and 4.x), and Source: […]

Read More

Daily NCSC-FI news followup 2021-08-13

Microsoft Exchange servers are getting hacked via ProxyShell exploits www.bleepingcomputer.com/news/microsoft/microsoft-exchange-servers-are-getting-hacked-via-proxyshell-exploits/ Threat actors are actively exploiting Microsoft Exchange servers using the ProxyShell vulnerability to install backdoors for later access. ProxyShell is the name of an attack that uses three chained Microsoft Exchange vulnerabilities to perform unauthenticated, remote code execution. Vice Society Leverages PrintNightmare In Ransomware Attacks […]

Read More

[ThreatPost] Windows Hello Bypass Fools Biometrics Safeguards in PCs

All posts, ThreatPost

A Windows security bug would allow an attacker to fool a USB camera used in the biometric facial-recognition aspect of the system. Source: Read More (Threatpost)

Read More